CA2400223A1 - Validation protocol and system - Google Patents

Validation protocol and system Download PDF

Info

Publication number
CA2400223A1
CA2400223A1 CA002400223A CA2400223A CA2400223A1 CA 2400223 A1 CA2400223 A1 CA 2400223A1 CA 002400223 A CA002400223 A CA 002400223A CA 2400223 A CA2400223 A CA 2400223A CA 2400223 A1 CA2400223 A1 CA 2400223A1
Authority
CA
Canada
Prior art keywords
chip
random number
function
signature
authentication chip
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002400223A
Other languages
French (fr)
Other versions
CA2400223C (en
Inventor
Simon Robert Walmsley
Paul Lapstun
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Memjet Technology Ltd
Original Assignee
Silverbrook Research Pty Ltd
Simon Robert Walmsley
Paul Lapstun
Zamtec Limited
Memjet Technology Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Silverbrook Research Pty Ltd, Simon Robert Walmsley, Paul Lapstun, Zamtec Limited, Memjet Technology Limited filed Critical Silverbrook Research Pty Ltd
Publication of CA2400223A1 publication Critical patent/CA2400223A1/en
Application granted granted Critical
Publication of CA2400223C publication Critical patent/CA2400223C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing
    • G06Q20/4097Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
    • G06Q20/40975Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/065Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
    • H04L9/0656Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
    • H04L9/0662Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response

Abstract

This invention is a validation protocol for determining whether an untrusted authentication chip is valid, or not. In another aspect it concerns a validation system for the protocol. The protocol may be used to determine the physical presence of a valid authentication chip. In this case a system may call the trusted chip to generate a random number and a digital signature for it, encrypt them with a first key and then call a prove function in the untrusted chip. The prove function decrypts the random number and signature, and calculates another signature from the decrypted random number, for comparison with the decrypted one. If the comparison is successful the random number is encrypted with another key and sent back. Finally, a test function is called in the trusted chip to generate its own encrypted version of the random number using the second key and then compare it with the received version to validate the untrusted chip. The untrusted chip may be associated with a consumable so that validation of the untrusted chip authenticates the consumable.

Claims (20)

1. A validation protocol for determining whether an untrusted authentication chip is valid, or not, including the steps of:
generating a secret random number and calculating a signature for the random number using a signature function, in a trusted authentication chip;
encrypting the random number and the signature by a symmetric encryption function using a first key, in the trusted authentication chip;
passing the encrypted random number and signature from the trusted authentication chip to an untrusted authentication chip;
decrypting the encrypted random number and signature with a symmetric decryption function using the first key, in the untrusted authentication chip;
calculating a signature for the decrypted random number using the signature function, in the untrusted authentication chip;
comparing the signature calculated in the untrusted authentication chip with the signature decrypted;
in the event that the two signatures match, encrypting the decrypted random number by the symmetric encryption function using a second key and returning it to the trusted authentication chip;
encrypting the random number by the symmetric encryption function using the second key, in the trusted authentication chip;
comparing the two random numbers encrypted using the second key, in the trusted authentication chip;
in the event that the two random numbers encrypted using the second key match, considering the untrusted authentication chip to be valid;
otherwise considering the unfrosted authentication chip to be invalid.
2. The protocol according to claim 1, where the first and second keys are held in both the trusted and unfrosted authentication chips, and are kept secret.
3. The protocol according to claim 1, where the trusted authentication chip contains a random function to produce random numbers from a seed, and the function advances after each successful validation, so that the next random number will be produced from a new seed.
4. The protocol according to claim 1, where the symmetric decrypt function is held only in the unfrosted chip.
5. The protocol according to claim 1, where the signature function generates digital signatures of 160 bits.
6. The protocol according to claim 1, where a prove function is held only in the untrusted chip to test the decrypted random number and signature, and return the random number encrypted with the second key if a signature calculated from the decrypted random number matches the decrypted signature; otherwise it returns an indication the chip is invalid.
7.~The protocol according to claim 6, where the time taken to return an indication the chip is invalid is the same for all bad inputs, and the time taken to return the random number encrypted with the second key is the same for all good inputs.
8. ~The protocol according to claim 1, where a test function is held only in the trusted chip to advance the random number if the untrusted chip is valid; otherwise it returns an indication the chip is invalid.
9. ~The protocol according to claim 8, where the time taken to return an indication the chip is invalid is the same for all bad inputs, and the time taken to return an indication the chip is valid is the same for all good inputs.
10. ~The protocol according to claim 1, where it is used to determine the physical presence of a valid authentication chip.
11. ~A validation system for performing the method according to claim 1, where the system includes a trusted authentication chip and an untrusted authentication chip;
where the trusted authentication chip includes a random number generator, a symmetric encryption function and two keys for the function, a signature function and a test function; and the untrusted authentication chip includes a symmetric encryption and decryption function and two keys for these functions, a signature function, and a prove function to decrypt a random number and signature encrypted using the first key by the trusted authentication chip, and to calculate another signature from the decrypted random number, for comparison with the decrypted one, and in the event that the comparison is successful to encrypt the random number with the second key and send it back; the test function in the trusted chip then operates to generate an encrypted version of the random number using the second key and to compare it with the received version to validate the untrusted chip.
12. ~A validation system according to claim 11, where the remainder of the system is software, hardware or a combination of both, but the trusted chip is a physical authentication chip.
13. ~A validation system according to claim 11, where both chips have the same internal structure.
14. ~A validation system according to claim 11, where the first and second keys are kept secret.
15. ~A validation system according to claim 11, where the trusted authentication chip contains a random function to produce random numbers from a seed, and the function advances after each successful validation, so that the next random number will be produced from a new seed.
16. ~A validation system according to claim 11, where the signature function generates digital signatures of 160 bits.
17. ~A validation system according to claim 11, where the prove function returns an indication the chip is invalid for all bad inputs and the time taken to do this is the same for all bad inputs, and the time taken to return the random number encrypted with the second key is the same for all good inputs.
18. ~A validation system according to claim 11, where the test function advances the random number if the untrusted chip is validated.
19. ~A validation system according to claim 11, where the time taken for the test function to return an indication the chip not validated is the same for all bad inputs, and the time taken to return an indication that the chip is validated is the same for all good inputs.
20. A validation system according to claim 11, where it is used to determine the physical presence of a valid authentication chip.
CA2400223A 2000-02-15 2001-02-15 Validation protocol and system Expired - Fee Related CA2400223C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US09/505,951 2000-02-15
US09/505,951 US7685423B1 (en) 2000-02-15 2000-02-15 Validation protocol and system
PCT/AU2001/000141 WO2001061918A1 (en) 2000-02-15 2001-02-15 Validation protocol and system

Publications (2)

Publication Number Publication Date
CA2400223A1 true CA2400223A1 (en) 2001-08-23
CA2400223C CA2400223C (en) 2011-05-03

Family

ID=24012546

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2400223A Expired - Fee Related CA2400223C (en) 2000-02-15 2001-02-15 Validation protocol and system

Country Status (6)

Country Link
US (4) US7685423B1 (en)
EP (1) EP1260054B1 (en)
AU (2) AU3144301A (en)
CA (1) CA2400223C (en)
SG (1) SG127733A1 (en)
WO (1) WO2001061918A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7941661B2 (en) 2000-02-15 2011-05-10 Silverbrook Research Pty Ltd Method of testing validity of authentication IC
US7962767B2 (en) 1997-07-15 2011-06-14 Silverbrook Research Pty Ltd Integrated circuit having obscured state change circuitry
US8370260B2 (en) 1997-07-15 2013-02-05 Zamtec Ltd Printing system for validating printing consumable

Families Citing this family (69)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7685423B1 (en) * 2000-02-15 2010-03-23 Silverbrook Research Pty Ltd Validation protocol and system
US20050120217A1 (en) * 2000-06-05 2005-06-02 Reallegal, Llc Apparatus, System, and Method for Electronically Signing Electronic Transcripts
FR2821225B1 (en) * 2001-02-20 2005-02-04 Mobileway REMOTE ELECTRONIC PAYMENT SYSTEM
CN1672382B (en) * 2002-07-26 2010-09-01 皇家飞利浦电子股份有限公司 Secure authenticated distance measurement
WO2004032411A1 (en) * 2002-09-11 2004-04-15 Giesecke & Devrient Gmbh Protected cryptographic calculation
US6996233B2 (en) * 2003-06-19 2006-02-07 International Business Machines Corporation System and method for encrypting and verifying messages using three-phase encryption
US7490237B1 (en) * 2003-06-27 2009-02-10 Microsoft Corporation Systems and methods for caching in authentication systems
US8862866B2 (en) 2003-07-07 2014-10-14 Certicom Corp. Method and apparatus for providing an adaptable security level in an electronic communication
KR100574945B1 (en) * 2003-08-08 2006-04-28 삼성전자주식회사 Method for implementing cryptographic engine of overlapping operation and variable clock operation
US8245279B2 (en) 2003-08-19 2012-08-14 Certicom Corp. Method and apparatus for synchronizing an adaptable security level in an electronic communication
KR100546375B1 (en) * 2003-08-29 2006-01-26 삼성전자주식회사 Interdependent parallel processing hardware cryptographic engine providing for enhanced self fault-detecting and hardware encryption processing method thereof
US7558954B2 (en) * 2003-10-31 2009-07-07 Hewlett-Packard Development Company, L.P. Method and apparatus for ensuring the integrity of data
US8165297B2 (en) 2003-11-21 2012-04-24 Finisar Corporation Transceiver with controller for authentication
US8099791B1 (en) 2004-06-25 2012-01-17 Lexmark International, Inc. Method of authenticating a consumable in an imaging device
FR2874144A1 (en) * 2004-08-03 2006-02-10 France Telecom ANONYMOUS AUTHENTICATION METHOD BASED ON ASYMMETRIC TYPE CRYPTOGRAPHIC ALGORITHM
US7574409B2 (en) * 2004-11-04 2009-08-11 Vericept Corporation Method, apparatus, and system for clustering and classification
US7450723B2 (en) * 2004-11-12 2008-11-11 International Business Machines Corporation Method and system for providing for security in communication
US7355527B2 (en) * 2005-01-10 2008-04-08 William Franklin System and method for parking infraction detection
JP2008541163A (en) * 2005-05-11 2008-11-20 エヌエックスピー ビー ヴィ Communication protocol and telecommunications system, in particular authentication management system and corresponding method
WO2007007690A1 (en) * 2005-07-07 2007-01-18 Kabushiki Kaisha Toshiba Authentication system, device, and program
US7870103B1 (en) * 2005-10-13 2011-01-11 Emc Corporation Tolerating and reporting collisions in content-derived identifiers of data segments using secondary identifiers
KR101006283B1 (en) 2005-12-15 2011-01-06 인터내셔널 비지네스 머신즈 코포레이션 Method and systems using radio frequency identifier tags for comparing and authenticating items
WO2007073766A1 (en) * 2005-12-29 2007-07-05 Telecom Italia S.P.A. A method for communicating entitlement data from a server, related server, client systems and computer program product
US8171542B2 (en) * 2006-02-13 2012-05-01 Honeywell International Inc. Advanced encryption standard to provide hardware key interface
US7992194B2 (en) 2006-03-14 2011-08-02 International Business Machines Corporation Methods and apparatus for identity and role management in communication networks
US8135959B2 (en) * 2006-04-07 2012-03-13 Honeywell International Inc. External key to provide protection to devices
JP4911736B2 (en) 2006-04-13 2012-04-04 サーティコム コーポレーション Method and apparatus for providing adaptive security levels in electronic communications
US8935416B2 (en) * 2006-04-21 2015-01-13 Fortinet, Inc. Method, apparatus, signals and medium for enforcing compliance with a policy on a client computer
EP1868126B1 (en) * 2006-06-16 2011-08-10 Thomson Licensing Device and method for discovering emulated clients
US7602291B2 (en) * 2006-09-14 2009-10-13 Userstar Information System Co., Ltd. Method and system for verifying authenticity of an object
US8762714B2 (en) * 2007-04-24 2014-06-24 Finisar Corporation Protecting against counterfeit electronics devices
US9148286B2 (en) * 2007-10-15 2015-09-29 Finisar Corporation Protecting against counterfeit electronic devices
US20090240945A1 (en) * 2007-11-02 2009-09-24 Finisar Corporation Anticounterfeiting means for optical communication components
US8819423B2 (en) * 2007-11-27 2014-08-26 Finisar Corporation Optical transceiver with vendor authentication
EP2101302A1 (en) * 2008-03-12 2009-09-16 Userstar Information System Co., Ltd. Method and system for verifying authenticity of an object
US8051467B2 (en) 2008-08-26 2011-11-01 Atmel Corporation Secure information processing
US8789746B2 (en) * 2009-01-31 2014-07-29 Solexir Technology Inc. Product authentication using integrated circuits
US8713705B2 (en) * 2009-08-03 2014-04-29 Eisst Ltd. Application authentication system and method
CN102081727B (en) * 2009-11-30 2014-04-30 中兴通讯股份有限公司 Safety certificate method and system for radio frequency identification
TW201212612A (en) * 2010-09-07 2012-03-16 Hon Hai Prec Ind Co Ltd System and method for protecting keys
WO2012120671A1 (en) * 2011-03-09 2012-09-13 富士通株式会社 Authentication system using symmetric-key cryptography
US9129536B2 (en) 2012-08-31 2015-09-08 Freescale Semiconductor, Inc. Circuit for secure provisioning in an untrusted environment
US9100189B2 (en) 2012-08-31 2015-08-04 Freescale Semiconductor, Inc. Secure provisioning in an untrusted environment
US9100174B2 (en) 2012-08-31 2015-08-04 Freescale Semiconductor, Inc. Secure provisioning in an untrusted environment
US9094205B2 (en) 2012-08-31 2015-07-28 Freescale Semiconductor, Inc. Secure provisioning in an untrusted environment
US9323957B2 (en) * 2013-03-01 2016-04-26 Marvell World Trade Ltd. Anti-tamper system based on dual random bits generators for integrated circuits
US8873750B2 (en) 2013-03-14 2014-10-28 International Business Machines Corporation Instruction for performing a pseudorandom number generate operation
US9201629B2 (en) 2013-03-14 2015-12-01 International Business Machines Corporation Instruction for performing a pseudorandom number seed operation
DE102013207477A1 (en) * 2013-04-24 2014-10-30 Bundesdruckerei Gmbh Carrying out a chip card function
WO2014175900A1 (en) * 2013-04-26 2014-10-30 Hewlett-Packard Development Company, L.P. Authentication utilizing encoded data
PT3022059T (en) 2013-08-30 2017-05-03 Hewlett Packard Development Co Lp Supply authentication via timing challenge response
US9401905B1 (en) * 2013-09-25 2016-07-26 Emc Corporation Transferring soft token authentication capabilities to a new device
US10769315B2 (en) * 2014-12-01 2020-09-08 T-Mobile Usa, Inc. Anti-theft recovery tool
US9430658B2 (en) 2014-12-16 2016-08-30 Freescale Semiconductor, Inc. Systems and methods for secure provisioning of production electronic circuits
CN104780069B (en) * 2015-04-16 2018-03-30 中国科学院计算技术研究所 A kind of key-course towards SDN and data Layer communication port self-configuration method and its system
CN104836668A (en) * 2015-05-06 2015-08-12 东华大学 Detection method for resistance of MD5 hash function against differential fault attack
US20170186317A1 (en) 2015-12-29 2017-06-29 Tannery Creek Systems Inc. System and Method for Determining Parking Infraction
US10496814B2 (en) * 2016-03-07 2019-12-03 Intertrust Technologies Corporation Software integrity checking systems and methods
FR3054763B1 (en) * 2016-07-29 2019-08-30 Dover Europe Sarl SYSTEM FOR ADVANCED PROTECTION OF CONSUMABLE OR DETACHABLE ELEMENTS OF INDUSTRIAL PRINTER
CN106878015A (en) * 2017-04-14 2017-06-20 江苏亨通问天量子信息研究院有限公司 Encryption satellite communication system and method
CN111183036B (en) 2017-10-18 2021-07-13 惠普发展公司,有限责任合伙企业 Integrated circuit device for replaceable printer components
FR3076925B1 (en) * 2018-01-16 2020-01-24 Proton World International N.V. CRYPTOGRAPHIC FUNCTION
US20190042480A1 (en) * 2018-02-05 2019-02-07 Intel Corporation Method for non-volatile memory and memory controller secured and authenticated pairing
CN111726274B (en) * 2020-05-25 2021-10-29 武汉理工大学 Automobile CAN bus data communication method, equipment and storage medium
US11764972B2 (en) 2021-02-25 2023-09-19 International Business Machines Corporation Generating a hybrid security certificate using multiple cryptosystems
CN116300356A (en) * 2021-04-01 2023-06-23 珠海奔图电子有限公司 Consumable chip, consumable, image forming apparatus, and communication method
US20220382912A1 (en) * 2021-06-01 2022-12-01 Cisco Technology, Inc. Using a trust anchor to verify an identity of an asic
CN113346994A (en) * 2021-06-24 2021-09-03 北京八分量信息科技有限公司 Big data credibility verification method and system based on random sampling detection
CN113671807A (en) * 2021-08-13 2021-11-19 北京辰光融信技术有限公司 USB consumable identification method for printer, consumable equipment and printer

Family Cites Families (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4736423A (en) 1985-04-30 1988-04-05 International Business Machines Corporation Technique for reducing RSA Crypto variable storage
US4799061A (en) 1985-11-18 1989-01-17 International Business Machines Corporation Secure component authentication system
MX174467B (en) * 1986-01-23 1994-05-17 Squibb & Sons Inc 1,4,7-TRISCARBOXIMETHYL-1,4,7,10-TETRAAZACICLODO DECAN SUBSTITUTE IN 1 AND ANALOG COMPOUNDS
US5319710A (en) * 1986-08-22 1994-06-07 Tandem Computers Incorporated Method and means for combining and managing personal verification and message authentication encrytions for network transmission
JPH01114995A (en) 1987-10-29 1989-05-08 Toppan Printing Co Ltd Identification card
US4961088A (en) * 1989-04-20 1990-10-02 Xerox Corporation Monitor/warranty system for electrostatographic reproducing machines using replaceable cartridges
US5036461A (en) 1990-05-16 1991-07-30 Elliott John C Two-way authentication system between user's smart card and issuer-specific plug-in application modules in multi-issued transaction device
DE69133502T2 (en) 1990-06-01 2006-09-14 Kabushiki Kaisha Toshiba, Kawasaki Secret transmission method and device
EP0504364B1 (en) * 1990-08-29 1997-10-15 Hughes Aircraft Company Distributed user authentication protocol
US5196840A (en) 1990-11-05 1993-03-23 International Business Machines Corporation Secure communications system for remotely located computers
JP2671649B2 (en) 1991-07-08 1997-10-29 三菱電機株式会社 Authentication method
WO1993021711A1 (en) * 1992-04-09 1993-10-28 Siemens Aktiengesellschaft Process for detecting unauthorised reinjection of data sent by a transmitter to a receiver
JPH0764817A (en) * 1993-08-30 1995-03-10 Mitsubishi Electric Corp Fault detection system
IT1261605B (en) * 1993-10-11 1996-05-23 Olivetti & Co Spa PRINTER WITH INTERCHANGEABLE PRINT HEADS
US5475756A (en) * 1994-02-17 1995-12-12 At&T Corp. Method of authenticating a terminal in a transaction execution system
US5515441A (en) 1994-05-12 1996-05-07 At&T Corp. Secure communication method and apparatus
US5506905A (en) 1994-06-10 1996-04-09 Delco Electronics Corp. Authentication method for keyless entry system
CA2164536A1 (en) * 1995-01-03 1996-07-04 William G. Hawkins Ink supply identification system
US5619571A (en) 1995-06-01 1997-04-08 Sandstrom; Brent B. Method for securely storing electronic records
US5689565A (en) * 1995-06-29 1997-11-18 Microsoft Corporation Cryptography system and method for providing cryptographic services for a computer application
JP3541522B2 (en) 1995-10-09 2004-07-14 松下電器産業株式会社 Communication protection system and equipment between devices
JP3363680B2 (en) * 1995-12-28 2003-01-08 ブラザー工業株式会社 Cartridge authenticity discrimination method and output device using the same
US6085320A (en) 1996-05-15 2000-07-04 Rsa Security Inc. Client/server protocol for proving authenticity
FR2749948B1 (en) * 1996-06-13 1998-08-14 Sagem PRINTER ASSEMBLY AND CONSUMPTION TANK FOR OFFICE MACHINE
US6073236A (en) 1996-06-28 2000-06-06 Sony Corporation Authentication method, communication method, and information processing apparatus
US5933652A (en) * 1996-08-30 1999-08-03 Advanced System Products, Inc. Host independent peripheral controller with on-board firmware
US5839119A (en) * 1996-09-27 1998-11-17 Xerox Corporation Method of electronic payments that prevents double-spending
US5956404A (en) * 1996-09-30 1999-09-21 Schneier; Bruce Digital signature with auditing bits
US6023509A (en) * 1996-09-30 2000-02-08 Intel Corporation Digital signature purpose encoding
US6005943A (en) 1996-10-29 1999-12-21 Lucent Technologies Inc. Electronic identifiers for network terminal devices
US6192473B1 (en) 1996-12-24 2001-02-20 Pitney Bowes Inc. System and method for mutual authentication and secure communications between a postage security device and a meter server
US6009173A (en) * 1997-01-31 1999-12-28 Motorola, Inc. Encryption and decryption method and apparatus
AUPO799197A0 (en) 1997-07-15 1997-08-07 Silverbrook Research Pty Ltd Image processing method and apparatus (ART01)
US5956051A (en) * 1997-05-29 1999-09-21 Pitney Bowes Inc. Disabling a mailing machine when a print head is not installed
US5971272A (en) 1997-08-19 1999-10-26 At&T Corp. Secured personal identification number
IL121640A (en) * 1997-08-27 2000-06-01 Scitex Corp Ltd Ink cartridge
US7039805B1 (en) * 1998-05-20 2006-05-02 Messing John H Electronic signature method
JPH11338982A (en) 1998-05-25 1999-12-10 Mitsubishi Electric Corp Ic memory card system device and ic memory card therefor
US6018291A (en) 1998-06-04 2000-01-25 Marble; Alan Dale Motor vehicle anti-theft system by random problem simulation
AU3841999A (en) 1998-06-05 1999-12-30 Landis & Gyr Communications Sarl Preloaded ic-card and method for authenticating the same
US6158850A (en) * 1998-06-19 2000-12-12 Lexmark International, Inc. On carrier secondary ink tank with memory and flow control means
US6816968B1 (en) * 1998-07-10 2004-11-09 Silverbrook Research Pty Ltd Consumable authentication protocol and system
US6243832B1 (en) * 1998-08-12 2001-06-05 Bell Atlantic Network Services, Inc. Network access server testing system and methodology
US6494562B1 (en) * 1998-09-03 2002-12-17 Hewlett-Packard Company Method and apparatus for identifying a sales channel
US5995774A (en) * 1998-09-11 1999-11-30 Lexmark International, Inc. Method and apparatus for storing data in a non-volatile memory circuit mounted on a printer's process cartridge
US6351538B1 (en) 1998-10-06 2002-02-26 Lsi Logic Corporation Conditional access and copy protection scheme for MPEG encoded video data
JP3755755B2 (en) * 1999-07-14 2006-03-15 セイコーエプソン株式会社 An ink cartridge, an ink jet recording apparatus using the ink cartridge, and a method for determining whether an ink cartridge can be attached to the apparatus.
US7243236B1 (en) * 1999-07-29 2007-07-10 Intertrust Technologies Corp. Systems and methods for using cryptography to protect secure and insecure computing environments
US7685423B1 (en) * 2000-02-15 2010-03-23 Silverbrook Research Pty Ltd Validation protocol and system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7962767B2 (en) 1997-07-15 2011-06-14 Silverbrook Research Pty Ltd Integrated circuit having obscured state change circuitry
US8370260B2 (en) 1997-07-15 2013-02-05 Zamtec Ltd Printing system for validating printing consumable
US7941661B2 (en) 2000-02-15 2011-05-10 Silverbrook Research Pty Ltd Method of testing validity of authentication IC

Also Published As

Publication number Publication date
US7685424B2 (en) 2010-03-23
US7685423B1 (en) 2010-03-23
WO2001061918A1 (en) 2001-08-23
AU3144301A (en) 2001-08-27
AU2001231443B2 (en) 2004-02-19
US20030159036A1 (en) 2003-08-21
SG127733A1 (en) 2006-12-29
EP1260054B1 (en) 2013-04-10
EP1260054A1 (en) 2002-11-27
CA2400223C (en) 2011-05-03
EP1260054A4 (en) 2006-10-18
US20040049678A1 (en) 2004-03-11
US20100153729A1 (en) 2010-06-17

Similar Documents

Publication Publication Date Title
CA2400223A1 (en) Validation protocol and system
CA2400220A1 (en) Consumable authentication protocol and system
US8130961B2 (en) Method and system for client-server mutual authentication using event-based OTP
US6769060B1 (en) Method of bilateral identity authentication
US6996712B1 (en) Data authentication system employing encrypted integrity blocks
SG143962A1 (en) Validating an authentication chip using a secret key
CN101369889B (en) Method for electronic endorsement of document
CN110401615B (en) Identity authentication method, device, equipment, system and readable storage medium
US8165286B2 (en) Combination white box/black box cryptographic processes and apparatus
US20050166263A1 (en) System and method providing disconnected authentication
RU2005104945A (en) EFFECTIVE ENCRYPTION AND AUTHENTICATION FOR DATA PROCESSING SYSTEMS
US11853465B2 (en) Securing data stored in a memory of an IoT device during a low power mode
JP7059282B6 (en) Network devices and trusted third-party devices
CN112385175B (en) Device for data encryption and integrity
JPH1028114A (en) Work quantity reducing method, ciphering secret key supply method, cipher system executing method, ciphered message data structure and computer medium
JP2002232410A (en) Equipment and method for communicating ciphered data
CN111222118A (en) Certification information generation and query method based on alliance chain
WO2009153846A1 (en) Authentication system, registration device, and authentication device
JP2002063139A (en) Terminal equipment and server device and terminal authenticating method
KR20090048213A (en) Method and apparatus for double encryption of data
JP4122164B2 (en) One-way communication partner authentication protocol
CA2566253A1 (en) System and method for protecting a password against brute force attacks
JP2003333034A (en) Authenticated encryption method and apparatus, authenticated encryption program, memory medium having authenticated encryption program stored thereon, authenticated decryption method and apparatus, authenticated decryption program, and memory medium having authenticated decryption program stored thereon
JP2005217665A (en) Communications system, transmitter, receiver and communication method
JP2001062128A (en) Verification method of game machine, game machine, and verification device

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed

Effective date: 20180215